SlideShare ist ein Scribd-Unternehmen logo
1 von 35
Downloaden Sie, um offline zu lesen
FABRIKAM
AUTHORIZATION FOR WORKLOADS IN A
DYNAMICALLY SCALING HETEROGENEOUS
SYSTEM
M.K.P.R. Jayawardhana
158217G
Supervised by
Prof. Gihan Dias
Mr. Prabath Siriwardena
Master of Science in Computer Science and Engineering
University of Moratuwa
Sri Lanka
Dvaara
Contribution of the Research
Considering ‘Cloud’(eg: Amazon EC2, Azure, GCP) as the most common use case of a dynamically
scaling, heterogeneous system,
● Design a solution for authorization among multi-cloud systems
● Implement the designed solution
Re-use + implement lacking components + integration
● Implementation evaluation using a case study
● Performance evaluation
2
Dvaara
3
Introduction
Ref : https://www.slideshare.net/ajessup/building-trust-between-modern-distributed-systems-with-spiffe
3
Modern Enterprise Systems,
● Mostly Distributed Systems
● Horizontal Scaling
● Avoid vendor lock-in
● Make use of external systems than
having everything in-house,
○ Make use of SaaS providers
○ Make use of PaaS providers
○ Make use of IaaS providers
● High availability concerns
● Elasticity of the system is a concern
with rapid growth and peak and
off-peak times.
● Follows Micro Services
Architecture(MSA)
Dvaara
Why multi-cloud?
● Organizations are concerned on moving everything
to the cloud → Security and Privacy concerns +
Vendor lock-in
● Hybrid cloud to get started → Sensitive data
residing on-premise and heavy computing
delegated to an external cloud.
● Cost-effectiveness and reducing go-to-market time
makes cloud appealing.
Introduction
4
Ref:
https://www.nutanix.com/enterprise-cloud-index/docs/enterprise-cloud-index.pdf,
https://www.gartner.com/doc/3784664/building-identity-microservices
“MSA(Microservice Architecture)-specific IAM(Identity
and Access Management) is still in its infancy. The
primary focus of the MSA community thus far has been
authentication and, more narrowly, the use of OAuth
2.0, leaving other important questions, such as the
authorization architecture, unaddressed”?? - Gartner
Dvaara
Problem
Problem Statement
● Enterprise systems are becoming a service mesh.
● Each component of the system needs to scale as
required, while being able to interact with other
services.
● Interaction needs to be secured.
● Authentication between these services is being
addressed.
5Ref : https://azure.microsoft.com/en-us/blog/microservices-on-azure-kubernetes-guidance/
How do we define and implement an authorization system
for a multi-cloud enterprise system?
Dvaara
Use Case
Problem Statement
An e-commerce company has decided to start a cloud journey with below, considering the features supported by
each CSP, cost and vendor lock-in.
● Keep the sensitive business operations in the on-premise cloud.
● Send data to be stored or archived to Amazon S3. Use EC2 analyse and summarize this data.
● Host a dashboard in GCP, that summarizes the details in Amazon S3 to identify the trends in
the market.
● Need high elasticity (peak, off-peak seasons and times)
To build the secure boundary, below interactions need to be secured
- On-premise to Amazon
- Amazon to GCP
6
Dvaara
Use Case - Problem
Problem Statement
Service authentication between multi-clouds when dynamic scaling is in place, is already
a concern being addressed by research community.
- Shared secret based
- Kerberos protocol
- CSP provided privileged API
- SPIFFE standard
How to support ‘Service Authorization’ in this system?
7
What should he
be allowed to
do?
Dvaara
Approach
● Study existing models, solutions and standards that support authorization between
services.
● Study the other relevant aspects of authorization such as authentication and
administration of access control policy as required by the authorization architecture
for a cloud system.
● Build up the components of the architecture, that can coexist with the current
enterprise systems, providing authorization capabilities across clouds.
8
Objectives
Dvaara
Literature Review
Literature Review
1. Classical Security Models
1.1. Authentication
1.2. Authorization
2. Future of Cloud Systems
3. Workloads
3.1. Workload Authentication
3.2. Workload Authorization
9
Dvaara
Access Control
Literature Review
10
Ref : R. S. Sandhu and P. Samarati, “Access control: principle and practice,” IEEE Commun. Mag., vol. 32, no. 9, pp. 40–48, 1994
Dvaara
Authentication
Literature Review
Identifying an entity such as a person, a group, a device or an application to be what they declare to be,
- Something Known
- Something Possessed
- Something Inherent
11
Ref: D. Gollmann, “Computer security,” WIREs Comp Stat, vol. 2, no. 5, Sep. 2010
Dvaara
Authorization
Literature Review
● DAC
● MAC
● Access Control Matrix
○ Access Control List
● RBAC
● ABAC
● XACML
● OPA
12
Image :
https://image.slidesharecdn.com/350pmaxio-irmsummit2014gerry-140611105654-phpapp02/
95/top-ten-reasons-why-developers-dont-adopt-abac-10-638.jpg
Ref : R. S. Sandhu and P. Samarati, “Access control: principle and practice,” IEEE Commun. Mag., vol. 32, no. 9, pp. 40–48, 1994
Dvaara
Classical Security Models
Literature Review
● Bell-La-Padula model - Confidentiality
● BIBA model - Integrity
● Chinese-Wall model - Conflict of Interest
● Clark-Wilson model - Integrity of commercial systems, Separation of duties
● Graham-Denning(GD) model - State transitions based on ACM
● Harrizon-Ruzzo-Ullman Model - Extending GD model
● Take-Grant Model - State transitions for confidentiality
13
Ref: D. Gollmann, “Computer security,” WIREs Comp Stat, vol. 2, no. 5, Sep. 2010
Dvaara
Cloud
Literature Review
- The most common, dynamically scaling, heterogeneous system
- SaaS, PaaS, IaaS
- Hyper-converged cloud to catalyze multi-cloud systems
14Ref: https://www.timetoast.com/timelines/cloud-computing-history
Dvaara
Workload
Literature Review
“A highly cohesive and de-coupled capability or a unit of work that collectively builds up
an enterprise application, which can be running on cloud or on-premise”
Eg:
● a microservice
● a Kubernetes pod
● a process in a VM
15
Ref: https://siliconangle.com/wp-content/blogs.dir/1/files/2016/02/illumio.png
Ref : M. C. Calzarossa, M. L. Della Vedova, L. Massari, D. Petcu, M. I. M. Tabash, and D. Tessera, “Workloads in the Clouds,”, Springer
International Publishing, 2016, pp. 525–550
Dvaara
Workload Authentication
Literature Review
● Challenge-response authentication
○ Credentials stored with workload
○ Challenged to provide an inherent attribute based on the system
● Needham–Schroeder protocol
○ Use a symmetric key
○ Based on a third party ‘Authentication server’, building trust
● Kerberos Protocol
○ Based on KDC (Key Distribution Center)
○ Not relying on network security
16
Ref: B. C. Neuman and T. Ts’o, “Kerberos: an authentication service for computer networks,” IEEE Commun. Mag., vol.
32, no. 9, pp. 33–38, Sep. 1994.
Dvaara
Single Cloud Authentication
Literature Review
● Platform provided privileged API based
authentication
○ Amazon EC2 IID
○ Google Cloud Provider IIT
○ Microsoft Azure MSI
17
{
"iss": "[TOKEN_ISSUER]",
"iat": [ISSUED_TIME],
"exp": [EXPIRED_TIME],
"aud": "[AUDIENCE]",
"sub": "[SUBJECT]",
"azp": "[AUTHORIZED_PARTY]",
"google": {
"compute_engine": {
"project_id": "[PROJECT_ID]",
"project_number": [PROJECT_NUMBER],
"zone": "[ZONE]",
"instance_id": [INSTANCE_ID],
"instance_name": "[INSTANCE_NAME]"
"instance_creation_timestamp":
[CREATION_TIMESTAMP]
}
}
}
Dvaara
Multi-Cloud Authentication
Literature Review
SPIFFE (Secure Production Identity Framework For
Everyone)
● A common protocol based on ‘Platform
Provided Privileged API’ for authentication.
● Extendable to work with CSPs.
● A standard accepted by the CNCF(Cloud
Native Computing Foundation).
18
Dvaara
Workload Authorization
Literature Review
● RBAC
○ OAuth 2.0 with scopes - client_credentials grant
● ABAC
○ OAuth 2.0 with scopes - client_credentials grant
○ XACML
○ OPA
● Authorization Servers in the market
○ Based on OAuth2.0 MTLS standard
○ KeyCloak, Gluu, WSO2 IS, Ping Identity, IBM API Connect
19
Dvaara
Solution Design
20
Dvaara
Dvaara Design Options
Solution Design
Enforcing authentication and authorization
21
Local authentication and
authorization
Local authorization and Global
authentication
Local authentication and Global
Authorization
Global authentication
and authorization
Dvaara
Dvaara Design Authentication
Solution Design
Comparison Authentication Mechanism
22
Mechanism Do not require to
deploy credentials
with the workload
Single identity per
workload
API driven
credentials
rotation and
distribution
Cross-platform
trust building
Firewall Yes Yes No Yes
Destination
authentication
No No No Yes
Platform mediated
identity
Yes Yes Yes No
SPIFFE Yes Yes Yes Yes
Dvaara
Dvaara Design Authorization
Solution Design
● DAC vs MAC
○ Governing authorization of information flow is not in the current scope
○ Hence DAC
● RBAC vs ABAC
○ Need to considered fine grained attributes of workloads
23
RBAC ABAC
Simplicity Yes Can be Complex
Fine-grained No Yes
Standardized No Yes (XACML/OPA)
Comparison Authorization Mechanism
Dvaara
Dvaara Design - XACML or OPA
Solution Design
● XACML vs OPA - policy comparison
24
XACML OPA
Flexible ABAC support Yes Yes
Extendability Yes Yes
Complexity High Occasionally
Verbose Yes No
Required training Yes (Though it’s XML, have specific
functions and behaviors to
understand)
Yes (Though it’s JSON like, have
special meanings for symbols and
ways of writing rules)
Implementation Availability Axiomatics, Sun XACML engine,
WSO2 Identity Server
OPA
Background Open standard by OASIS Open implementation, CNCF
accepted.
Dvaara
Overall Design
25
Solution Design
Dvaara
Dvaara Architecture
Solution Design
26
Dvaara
Dvaara Implementation
Solution Implementation
27
Dvaara
Dvaara Implementation Ctd
Solution Implementation
28
Dvaara
Dvaara Implementation Contribution
Solution Implementation
Chain of Responsibility Pattern
29
TLS level
validation on
the SPIFFE
X509 cert
OPA based
decision on
allowed
scopes, based
on SPIFFE ID
Token
validation
request
ABAC, validating the
workload attributes
and context against
OPA policy
Using Java-SPIFFE lib
New implementation of OPA based
scope validation handler
New implementation of OPA based
token validation handler
- Selected WSO2 IS authorization server was patched to support required parameters to be sent to OPA engine.
WSO2 IS patched to enrich
Dvaara
Evaluation
Solution Evaluation
30
1
2
1 - Token Request
2 - Actual API consumption using token
Dvaara
Demo
31
Dvaara
Evaluation
Solution Evaluation
32
Correctness
- Considered the use case of an employee management
solution
- Authorized access to a salary mgt API
- Fine grained authorization based on Infrastructure layer
details and application layer details
- Verified results against the expected results
Dvaara
Conclusion
33
- What Dvaara can do?
- Make authorization decisions based on infrastructure level and application level
attributes
- Understands the SPIFFE based authentication
- Allow dynamic changes to authorization policy
- Dvaara provides a viable solution for workload authorization in a multi-cloud
system
- Dvaara provides fine grained authorization in a dynamic manner
- Dvaara bridges the existing authorization technology of OAuth 2.0 and TLS
widely adopted open standard to the emerging cloud native standards of SPIFFE
and OPA
- Dvaara open doors for the existing enterprise systems to have benefits of hybrid
or multi-cloud without compromising on service authorization policies.
Dvaara
Future Work
34
- Make access token a JWT(JSON Web Token) that can carry attributes(advices)
between the workloads
- Federation between SPIRE server or Authorization servers to expand trust
boundary in a seamless manner
- Performance improvements - add caching improvements at token validation
- Provide an administration portal for the system
- Single view on policy available to issue SPIFFE IDs
- Single view of policies active in OPA engine
- CRUD operations on the policies and evaluating the effect
- Current overview of the system (active workloads, tokens etc.)
- OAuth 2.0 specification to bind the token to the TLS layer. (currently happening in
Dvaara in an indirect way)
FABRIKAM
THANK YOU
https://medium.com/@Pushpalanka
https://github.com/Dvaara/
Pushpalanka
pushpalankajaya@gmail.com
35

Weitere Àhnliche Inhalte

Was ist angesagt?

Mask R-CNN
Mask R-CNNMask R-CNN
Mask R-CNNChanuk Lim
 
Lecture6 spatial filtering (neighborhood operations) examples
Lecture6 spatial filtering (neighborhood operations) examplesLecture6 spatial filtering (neighborhood operations) examples
Lecture6 spatial filtering (neighborhood operations) examplesMarwa Ahmeid
 
책 ìœì–ŽìŁŒëŠ” ë”„ëŸŹë‹: 배우 유읞나가 í•ŽëŠŹíŹí„°ë„Œ 읜얎쀀닀멎 DEVIEW 2017
책 ìœì–ŽìŁŒëŠ” ë”„ëŸŹë‹: 배우 유읞나가 í•ŽëŠŹíŹí„°ë„Œ 읜얎쀀닀멎 DEVIEW 2017책 ìœì–ŽìŁŒëŠ” ë”„ëŸŹë‹: 배우 유읞나가 í•ŽëŠŹíŹí„°ë„Œ 읜얎쀀닀멎 DEVIEW 2017
책 ìœì–ŽìŁŒëŠ” ë”„ëŸŹë‹: 배우 유읞나가 í•ŽëŠŹíŹí„°ë„Œ 읜얎쀀닀멎 DEVIEW 2017Taehoon Kim
 
Teslaă«ăŠă‘ă‚‹ă‚łăƒłăƒ”ăƒ„ăƒŒă‚żăƒ“ă‚žăƒ§ăƒłæŠ€èĄ“ăźèȘżæŸ» (2)
Teslaă«ăŠă‘ă‚‹ă‚łăƒłăƒ”ăƒ„ăƒŒă‚żăƒ“ă‚žăƒ§ăƒłæŠ€èĄ“ăźèȘżæŸ» (2)Teslaă«ăŠă‘ă‚‹ă‚łăƒłăƒ”ăƒ„ăƒŒă‚żăƒ“ă‚žăƒ§ăƒłæŠ€èĄ“ăźèȘżæŸ» (2)
Teslaă«ăŠă‘ă‚‹ă‚łăƒłăƒ”ăƒ„ăƒŒă‚żăƒ“ă‚žăƒ§ăƒłæŠ€èĄ“ăźèȘżæŸ» (2)Kazuyuki Miyazawa
 
【DLèŒȘèȘ­äŒšă€‘TrOCR: Transformer-based Optical Character Recognition with Pre-traine...
【DLèŒȘèȘ­äŒšă€‘TrOCR: Transformer-based Optical Character Recognition with Pre-traine...【DLèŒȘèȘ­äŒšă€‘TrOCR: Transformer-based Optical Character Recognition with Pre-traine...
【DLèŒȘèȘ­äŒšă€‘TrOCR: Transformer-based Optical Character Recognition with Pre-traine...Deep Learning JP
 
Recent advances in deep recommender systems
Recent advances in deep recommender systemsRecent advances in deep recommender systems
Recent advances in deep recommender systemsNAVER Engineering
 
Advantages,disadvantages,applications and economic aspects of bitcoin
Advantages,disadvantages,applications and economic aspects of bitcoinAdvantages,disadvantages,applications and economic aspects of bitcoin
Advantages,disadvantages,applications and economic aspects of bitcoinTabish Ansar
 
【DLèŒȘèȘ­äŒšă€‘Segment Anything
【DLèŒȘèȘ­äŒšă€‘Segment Anything【DLèŒȘèȘ­äŒšă€‘Segment Anything
【DLèŒȘèȘ­äŒšă€‘Segment AnythingDeep Learning JP
 
Veriloggen.Stream: ăƒ‡ăƒŒă‚żăƒ•ăƒ­ăƒŒă‹ă‚‰ăƒăƒŒăƒ‰ă‚Šă‚§ă‚ąă‚’äœœă‚‹ïŒˆ2018ćčŽ3月3æ—„ é«˜äœćˆæˆć‹ăźäŒš 珏5曞 @東äșŹć·„æ„­ć€§ć­ŠïŒ‰
Veriloggen.Stream: ăƒ‡ăƒŒă‚żăƒ•ăƒ­ăƒŒă‹ă‚‰ăƒăƒŒăƒ‰ă‚Šă‚§ă‚ąă‚’äœœă‚‹ïŒˆ2018ćčŽ3月3æ—„ é«˜äœćˆæˆć‹ăźäŒš 珏5曞 @東äșŹć·„æ„­ć€§ć­ŠïŒ‰Veriloggen.Stream: ăƒ‡ăƒŒă‚żăƒ•ăƒ­ăƒŒă‹ă‚‰ăƒăƒŒăƒ‰ă‚Šă‚§ă‚ąă‚’äœœă‚‹ïŒˆ2018ćčŽ3月3æ—„ é«˜äœćˆæˆć‹ăźäŒš 珏5曞 @東äșŹć·„æ„­ć€§ć­ŠïŒ‰
Veriloggen.Stream: ăƒ‡ăƒŒă‚żăƒ•ăƒ­ăƒŒă‹ă‚‰ăƒăƒŒăƒ‰ă‚Šă‚§ă‚ąă‚’äœœă‚‹ïŒˆ2018ćčŽ3月3æ—„ é«˜äœćˆæˆć‹ăźäŒš 珏5曞 @東äșŹć·„æ„­ć€§ć­ŠïŒ‰Shinya Takamaeda-Y
 
lecun-01.ppt
lecun-01.pptlecun-01.ppt
lecun-01.pptVenkyChinna8
 
【DLèŒȘèȘ­äŒšă€‘Parameter is Not All You Need:Starting from Non-Parametric Networks fo...
【DLèŒȘèȘ­äŒšă€‘Parameter is Not All You Need:Starting from Non-Parametric Networks fo...【DLèŒȘèȘ­äŒšă€‘Parameter is Not All You Need:Starting from Non-Parametric Networks fo...
【DLèŒȘèȘ­äŒšă€‘Parameter is Not All You Need:Starting from Non-Parametric Networks fo...Deep Learning JP
 
ì•Œêž°ì‰ŹìšŽ Variational autoencoder
ì•Œêž°ì‰ŹìšŽ Variational autoencoderì•Œêž°ì‰ŹìšŽ Variational autoencoder
ì•Œêž°ì‰ŹìšŽ Variational autoencoder홍배 êč€
 
論文çŽč介 Semi-supervised Learning with Deep Generative Models
論文çŽč介 Semi-supervised Learning with Deep Generative Models論文çŽč介 Semi-supervised Learning with Deep Generative Models
論文çŽč介 Semi-supervised Learning with Deep Generative ModelsSeiya Tokui
 
SSII2020 [OS2-02] æ•™ćž«ă‚ă‚Šäș‹ć‰ć­Šçż’ă‚’ć‡Œé§•ă™ă‚‹ă€ŒćŒ±ă€æ•™ćž«ă‚ă‚Šäș‹ć‰ć­Šçż’
SSII2020 [OS2-02] æ•™ćž«ă‚ă‚Šäș‹ć‰ć­Šçż’ă‚’ć‡Œé§•ă™ă‚‹ă€ŒćŒ±ă€æ•™ćž«ă‚ă‚Šäș‹ć‰ć­Šçż’SSII2020 [OS2-02] æ•™ćž«ă‚ă‚Šäș‹ć‰ć­Šçż’ă‚’ć‡Œé§•ă™ă‚‹ă€ŒćŒ±ă€æ•™ćž«ă‚ă‚Šäș‹ć‰ć­Šçż’
SSII2020 [OS2-02] æ•™ćž«ă‚ă‚Šäș‹ć‰ć­Šçż’ă‚’ć‡Œé§•ă™ă‚‹ă€ŒćŒ±ă€æ•™ćž«ă‚ă‚Šäș‹ć‰ć­Šçż’SSII
 
A brief introduction to mutual information and its application
A brief introduction to mutual information and its applicationA brief introduction to mutual information and its application
A brief introduction to mutual information and its applicationHyun-hwan Jeong
 
ç”»ćƒć‡Šç†AIă‚’ç”šă„ăŸç•°ćžžæ€œçŸ„
ç”»ćƒć‡Šç†AIă‚’ç”šă„ăŸç•°ćžžæ€œçŸ„ç”»ćƒć‡Šç†AIă‚’ç”šă„ăŸç•°ćžžæ€œçŸ„
ç”»ćƒć‡Šç†AIă‚’ç”šă„ăŸç•°ćžžæ€œçŸ„Hideo Terada
 
NumPy闇慄門
NumPy闇慄門NumPy闇慄門
NumPy闇慄門Ryosuke Okuta
 
Algorithmic Music Recommendations at Spotify
Algorithmic Music Recommendations at SpotifyAlgorithmic Music Recommendations at Spotify
Algorithmic Music Recommendations at SpotifyChris Johnson
 
슀타튞업은 데읎터넌 ì–Žë–»êȌ 바띌뎐알 할êčŒ? (개정판)
슀타튞업은 데읎터넌 ì–Žë–»êȌ 바띌뎐알 할êčŒ? (개정판)슀타튞업은 데읎터넌 ì–Žë–»êȌ 바띌뎐알 할êčŒ? (개정판)
슀타튞업은 데읎터넌 ì–Žë–»êȌ 바띌뎐알 할êčŒ? (개정판)Yongho Ha
 
CVćˆ†é‡Žă§ăźæœ€èż‘ăźè„±â—‹â—‹çł»3遞
CVćˆ†é‡Žă§ăźæœ€èż‘ăźè„±â—‹â—‹çł»3遞CVćˆ†é‡Žă§ăźæœ€èż‘ăźè„±â—‹â—‹çł»3遞
CVćˆ†é‡Žă§ăźæœ€èż‘ăźè„±â—‹â—‹çł»3遞Kazuyuki Miyazawa
 

Was ist angesagt? (20)

Mask R-CNN
Mask R-CNNMask R-CNN
Mask R-CNN
 
Lecture6 spatial filtering (neighborhood operations) examples
Lecture6 spatial filtering (neighborhood operations) examplesLecture6 spatial filtering (neighborhood operations) examples
Lecture6 spatial filtering (neighborhood operations) examples
 
책 ìœì–ŽìŁŒëŠ” ë”„ëŸŹë‹: 배우 유읞나가 í•ŽëŠŹíŹí„°ë„Œ 읜얎쀀닀멎 DEVIEW 2017
책 ìœì–ŽìŁŒëŠ” ë”„ëŸŹë‹: 배우 유읞나가 í•ŽëŠŹíŹí„°ë„Œ 읜얎쀀닀멎 DEVIEW 2017책 ìœì–ŽìŁŒëŠ” ë”„ëŸŹë‹: 배우 유읞나가 í•ŽëŠŹíŹí„°ë„Œ 읜얎쀀닀멎 DEVIEW 2017
책 ìœì–ŽìŁŒëŠ” ë”„ëŸŹë‹: 배우 유읞나가 í•ŽëŠŹíŹí„°ë„Œ 읜얎쀀닀멎 DEVIEW 2017
 
Teslaă«ăŠă‘ă‚‹ă‚łăƒłăƒ”ăƒ„ăƒŒă‚żăƒ“ă‚žăƒ§ăƒłæŠ€èĄ“ăźèȘżæŸ» (2)
Teslaă«ăŠă‘ă‚‹ă‚łăƒłăƒ”ăƒ„ăƒŒă‚żăƒ“ă‚žăƒ§ăƒłæŠ€èĄ“ăźèȘżæŸ» (2)Teslaă«ăŠă‘ă‚‹ă‚łăƒłăƒ”ăƒ„ăƒŒă‚żăƒ“ă‚žăƒ§ăƒłæŠ€èĄ“ăźèȘżæŸ» (2)
Teslaă«ăŠă‘ă‚‹ă‚łăƒłăƒ”ăƒ„ăƒŒă‚żăƒ“ă‚žăƒ§ăƒłæŠ€èĄ“ăźèȘżæŸ» (2)
 
【DLèŒȘèȘ­äŒšă€‘TrOCR: Transformer-based Optical Character Recognition with Pre-traine...
【DLèŒȘèȘ­äŒšă€‘TrOCR: Transformer-based Optical Character Recognition with Pre-traine...【DLèŒȘèȘ­äŒšă€‘TrOCR: Transformer-based Optical Character Recognition with Pre-traine...
【DLèŒȘèȘ­äŒšă€‘TrOCR: Transformer-based Optical Character Recognition with Pre-traine...
 
Recent advances in deep recommender systems
Recent advances in deep recommender systemsRecent advances in deep recommender systems
Recent advances in deep recommender systems
 
Advantages,disadvantages,applications and economic aspects of bitcoin
Advantages,disadvantages,applications and economic aspects of bitcoinAdvantages,disadvantages,applications and economic aspects of bitcoin
Advantages,disadvantages,applications and economic aspects of bitcoin
 
【DLèŒȘèȘ­äŒšă€‘Segment Anything
【DLèŒȘèȘ­äŒšă€‘Segment Anything【DLèŒȘèȘ­äŒšă€‘Segment Anything
【DLèŒȘèȘ­äŒšă€‘Segment Anything
 
Veriloggen.Stream: ăƒ‡ăƒŒă‚żăƒ•ăƒ­ăƒŒă‹ă‚‰ăƒăƒŒăƒ‰ă‚Šă‚§ă‚ąă‚’äœœă‚‹ïŒˆ2018ćčŽ3月3æ—„ é«˜äœćˆæˆć‹ăźäŒš 珏5曞 @東äșŹć·„æ„­ć€§ć­ŠïŒ‰
Veriloggen.Stream: ăƒ‡ăƒŒă‚żăƒ•ăƒ­ăƒŒă‹ă‚‰ăƒăƒŒăƒ‰ă‚Šă‚§ă‚ąă‚’äœœă‚‹ïŒˆ2018ćčŽ3月3æ—„ é«˜äœćˆæˆć‹ăźäŒš 珏5曞 @東äșŹć·„æ„­ć€§ć­ŠïŒ‰Veriloggen.Stream: ăƒ‡ăƒŒă‚żăƒ•ăƒ­ăƒŒă‹ă‚‰ăƒăƒŒăƒ‰ă‚Šă‚§ă‚ąă‚’äœœă‚‹ïŒˆ2018ćčŽ3月3æ—„ é«˜äœćˆæˆć‹ăźäŒš 珏5曞 @東äșŹć·„æ„­ć€§ć­ŠïŒ‰
Veriloggen.Stream: ăƒ‡ăƒŒă‚żăƒ•ăƒ­ăƒŒă‹ă‚‰ăƒăƒŒăƒ‰ă‚Šă‚§ă‚ąă‚’äœœă‚‹ïŒˆ2018ćčŽ3月3æ—„ é«˜äœćˆæˆć‹ăźäŒš 珏5曞 @東äșŹć·„æ„­ć€§ć­ŠïŒ‰
 
lecun-01.ppt
lecun-01.pptlecun-01.ppt
lecun-01.ppt
 
【DLèŒȘèȘ­äŒšă€‘Parameter is Not All You Need:Starting from Non-Parametric Networks fo...
【DLèŒȘèȘ­äŒšă€‘Parameter is Not All You Need:Starting from Non-Parametric Networks fo...【DLèŒȘèȘ­äŒšă€‘Parameter is Not All You Need:Starting from Non-Parametric Networks fo...
【DLèŒȘèȘ­äŒšă€‘Parameter is Not All You Need:Starting from Non-Parametric Networks fo...
 
ì•Œêž°ì‰ŹìšŽ Variational autoencoder
ì•Œêž°ì‰ŹìšŽ Variational autoencoderì•Œêž°ì‰ŹìšŽ Variational autoencoder
ì•Œêž°ì‰ŹìšŽ Variational autoencoder
 
論文çŽč介 Semi-supervised Learning with Deep Generative Models
論文çŽč介 Semi-supervised Learning with Deep Generative Models論文çŽč介 Semi-supervised Learning with Deep Generative Models
論文çŽč介 Semi-supervised Learning with Deep Generative Models
 
SSII2020 [OS2-02] æ•™ćž«ă‚ă‚Šäș‹ć‰ć­Šçż’ă‚’ć‡Œé§•ă™ă‚‹ă€ŒćŒ±ă€æ•™ćž«ă‚ă‚Šäș‹ć‰ć­Šçż’
SSII2020 [OS2-02] æ•™ćž«ă‚ă‚Šäș‹ć‰ć­Šçż’ă‚’ć‡Œé§•ă™ă‚‹ă€ŒćŒ±ă€æ•™ćž«ă‚ă‚Šäș‹ć‰ć­Šçż’SSII2020 [OS2-02] æ•™ćž«ă‚ă‚Šäș‹ć‰ć­Šçż’ă‚’ć‡Œé§•ă™ă‚‹ă€ŒćŒ±ă€æ•™ćž«ă‚ă‚Šäș‹ć‰ć­Šçż’
SSII2020 [OS2-02] æ•™ćž«ă‚ă‚Šäș‹ć‰ć­Šçż’ă‚’ć‡Œé§•ă™ă‚‹ă€ŒćŒ±ă€æ•™ćž«ă‚ă‚Šäș‹ć‰ć­Šçż’
 
A brief introduction to mutual information and its application
A brief introduction to mutual information and its applicationA brief introduction to mutual information and its application
A brief introduction to mutual information and its application
 
ç”»ćƒć‡Šç†AIă‚’ç”šă„ăŸç•°ćžžæ€œçŸ„
ç”»ćƒć‡Šç†AIă‚’ç”šă„ăŸç•°ćžžæ€œçŸ„ç”»ćƒć‡Šç†AIă‚’ç”šă„ăŸç•°ćžžæ€œçŸ„
ç”»ćƒć‡Šç†AIă‚’ç”šă„ăŸç•°ćžžæ€œçŸ„
 
NumPy闇慄門
NumPy闇慄門NumPy闇慄門
NumPy闇慄門
 
Algorithmic Music Recommendations at Spotify
Algorithmic Music Recommendations at SpotifyAlgorithmic Music Recommendations at Spotify
Algorithmic Music Recommendations at Spotify
 
슀타튞업은 데읎터넌 ì–Žë–»êȌ 바띌뎐알 할êčŒ? (개정판)
슀타튞업은 데읎터넌 ì–Žë–»êȌ 바띌뎐알 할êčŒ? (개정판)슀타튞업은 데읎터넌 ì–Žë–»êȌ 바띌뎐알 할êčŒ? (개정판)
슀타튞업은 데읎터넌 ì–Žë–»êȌ 바띌뎐알 할êčŒ? (개정판)
 
CVćˆ†é‡Žă§ăźæœ€èż‘ăźè„±â—‹â—‹çł»3遞
CVćˆ†é‡Žă§ăźæœ€èż‘ăźè„±â—‹â—‹çł»3遞CVćˆ†é‡Žă§ăźæœ€èż‘ăźè„±â—‹â—‹çł»3遞
CVćˆ†é‡Žă§ăźæœ€èż‘ăźè„±â—‹â—‹çł»3遞
 

Ähnlich wie Authorization for workloads in a dynamically scaling heterogeneous system

Cloud Testing : An Overview
Cloud Testing : An OverviewCloud Testing : An Overview
Cloud Testing : An OverviewQA InfoTech
 
Cloud Computing Presentation
Cloud Computing PresentationCloud Computing Presentation
Cloud Computing PresentationMohammed Kharma
 
Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)
Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)
Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)Manoj Kumar
 
Cloud management
Cloud managementCloud management
Cloud managementsurbhi jha
 
Serverless security for multi cloud workloads
Serverless security for multi cloud workloadsServerless security for multi cloud workloads
Serverless security for multi cloud workloadsRuncy Oommen
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGEditor IJMTER
 
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...IJMER
 
Introduction to Google Cloud & GCCP Campaign
Introduction to Google Cloud & GCCP CampaignIntroduction to Google Cloud & GCCP Campaign
Introduction to Google Cloud & GCCP CampaignGDSCVJTI
 
Cloud computing intro
Cloud computing introCloud computing intro
Cloud computing introSridhara T V
 
Google Cloud Study Jam | GDSC NCU
Google Cloud Study Jam | GDSC NCUGoogle Cloud Study Jam | GDSC NCU
Google Cloud Study Jam | GDSC NCUShivam254129
 
Interop ITX: Moving applications: From Legacy to Cloud-to-Cloud
Interop ITX: Moving applications: From Legacy to Cloud-to-CloudInterop ITX: Moving applications: From Legacy to Cloud-to-Cloud
Interop ITX: Moving applications: From Legacy to Cloud-to-CloudSusan Wu
 
Who's in your Cloud? Cloud State Monitoring
Who's in your Cloud? Cloud State MonitoringWho's in your Cloud? Cloud State Monitoring
Who's in your Cloud? Cloud State MonitoringKevin Hakanson
 
Netscaler for mobility and secure remote access
Netscaler for mobility and secure remote accessNetscaler for mobility and secure remote access
Netscaler for mobility and secure remote accessCitrix
 
1. introduction to_cloud_services_architecture
1. introduction to_cloud_services_architecture1. introduction to_cloud_services_architecture
1. introduction to_cloud_services_architectureCloud Genius
 
Dynamic Azure Credentials for Applications and CI/CD Pipelines
Dynamic Azure Credentials for Applications and CI/CD PipelinesDynamic Azure Credentials for Applications and CI/CD Pipelines
Dynamic Azure Credentials for Applications and CI/CD PipelinesMitchell Pronschinske
 
Cloud is not an option, but is security?
Cloud is not an option, but is security?Cloud is not an option, but is security?
Cloud is not an option, but is security?Jody Keyser
 

Ähnlich wie Authorization for workloads in a dynamically scaling heterogeneous system (20)

Cloud Testing : An Overview
Cloud Testing : An OverviewCloud Testing : An Overview
Cloud Testing : An Overview
 
Cloud Computing Presentation
Cloud Computing PresentationCloud Computing Presentation
Cloud Computing Presentation
 
Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)
Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)
Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)
 
Cloud management
Cloud managementCloud management
Cloud management
 
Serverless security for multi cloud workloads
Serverless security for multi cloud workloadsServerless security for multi cloud workloads
Serverless security for multi cloud workloads
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
 
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
 
Introduction to Google Cloud & GCCP Campaign
Introduction to Google Cloud & GCCP CampaignIntroduction to Google Cloud & GCCP Campaign
Introduction to Google Cloud & GCCP Campaign
 
Cloud computing intro
Cloud computing introCloud computing intro
Cloud computing intro
 
Google Cloud Study Jam | GDSC NCU
Google Cloud Study Jam | GDSC NCUGoogle Cloud Study Jam | GDSC NCU
Google Cloud Study Jam | GDSC NCU
 
Interop ITX: Moving applications: From Legacy to Cloud-to-Cloud
Interop ITX: Moving applications: From Legacy to Cloud-to-CloudInterop ITX: Moving applications: From Legacy to Cloud-to-Cloud
Interop ITX: Moving applications: From Legacy to Cloud-to-Cloud
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Who's in your Cloud? Cloud State Monitoring
Who's in your Cloud? Cloud State MonitoringWho's in your Cloud? Cloud State Monitoring
Who's in your Cloud? Cloud State Monitoring
 
Netscaler for mobility and secure remote access
Netscaler for mobility and secure remote accessNetscaler for mobility and secure remote access
Netscaler for mobility and secure remote access
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Enterprise Cloud Transformation
Enterprise Cloud TransformationEnterprise Cloud Transformation
Enterprise Cloud Transformation
 
1. introduction to_cloud_services_architecture
1. introduction to_cloud_services_architecture1. introduction to_cloud_services_architecture
1. introduction to_cloud_services_architecture
 
Dynamic Azure Credentials for Applications and CI/CD Pipelines
Dynamic Azure Credentials for Applications and CI/CD PipelinesDynamic Azure Credentials for Applications and CI/CD Pipelines
Dynamic Azure Credentials for Applications and CI/CD Pipelines
 
Cloud is not an option, but is security?
Cloud is not an option, but is security?Cloud is not an option, but is security?
Cloud is not an option, but is security?
 
cc.pptx
cc.pptxcc.pptx
cc.pptx
 

Mehr von Pushpalanka Jayawardhana

The role of IAM in OpenBanking and where do we stand
The role of IAM in OpenBanking and where do we stand The role of IAM in OpenBanking and where do we stand
The role of IAM in OpenBanking and where do we stand Pushpalanka Jayawardhana
 
Frictionless Adaption of PSD2 with WSO2
Frictionless Adaption of PSD2 with WSO2Frictionless Adaption of PSD2 with WSO2
Frictionless Adaption of PSD2 with WSO2Pushpalanka Jayawardhana
 
Identity mediation for enterprise identity bus
Identity mediation for enterprise identity busIdentity mediation for enterprise identity bus
Identity mediation for enterprise identity busPushpalanka Jayawardhana
 
Threads and Concurrency Identifying Performance Deviations in Thread Pools
Threads and Concurrency Identifying Performance Deviations in Thread PoolsThreads and Concurrency Identifying Performance Deviations in Thread Pools
Threads and Concurrency Identifying Performance Deviations in Thread PoolsPushpalanka Jayawardhana
 
Approximate Protocol for Privacy Preserving Associate Rule Mining
Approximate Protocol for Privacy Preserving Associate Rule MiningApproximate Protocol for Privacy Preserving Associate Rule Mining
Approximate Protocol for Privacy Preserving Associate Rule MiningPushpalanka Jayawardhana
 
Leveraging federation capabilities of identity server for api gateway
Leveraging federation capabilities  of identity server for api gatewayLeveraging federation capabilities  of identity server for api gateway
Leveraging federation capabilities of identity server for api gatewayPushpalanka Jayawardhana
 
Feedback queuing models for time shared systems
Feedback queuing models for time shared systemsFeedback queuing models for time shared systems
Feedback queuing models for time shared systemsPushpalanka Jayawardhana
 

Mehr von Pushpalanka Jayawardhana (11)

The role of IAM in OpenBanking and where do we stand
The role of IAM in OpenBanking and where do we stand The role of IAM in OpenBanking and where do we stand
The role of IAM in OpenBanking and where do we stand
 
Frictionless Adaption of PSD2 with WSO2
Frictionless Adaption of PSD2 with WSO2Frictionless Adaption of PSD2 with WSO2
Frictionless Adaption of PSD2 with WSO2
 
Identity mediation for enterprise identity bus
Identity mediation for enterprise identity busIdentity mediation for enterprise identity bus
Identity mediation for enterprise identity bus
 
Threads and Concurrency Identifying Performance Deviations in Thread Pools
Threads and Concurrency Identifying Performance Deviations in Thread PoolsThreads and Concurrency Identifying Performance Deviations in Thread Pools
Threads and Concurrency Identifying Performance Deviations in Thread Pools
 
Approximate Protocol for Privacy Preserving Associate Rule Mining
Approximate Protocol for Privacy Preserving Associate Rule MiningApproximate Protocol for Privacy Preserving Associate Rule Mining
Approximate Protocol for Privacy Preserving Associate Rule Mining
 
Leveraging federation capabilities of identity server for api gateway
Leveraging federation capabilities  of identity server for api gatewayLeveraging federation capabilities  of identity server for api gateway
Leveraging federation capabilities of identity server for api gateway
 
Feedback queuing models for time shared systems
Feedback queuing models for time shared systemsFeedback queuing models for time shared systems
Feedback queuing models for time shared systems
 
Big Data CDR Analyzer - Kanthaka
Big Data CDR Analyzer - KanthakaBig Data CDR Analyzer - Kanthaka
Big Data CDR Analyzer - Kanthaka
 
Kanthaka - High Volume CDR Analyzer
Kanthaka - High Volume CDR AnalyzerKanthaka - High Volume CDR Analyzer
Kanthaka - High Volume CDR Analyzer
 
Experience at WSO2 as an Intern
Experience at WSO2 as an InternExperience at WSO2 as an Intern
Experience at WSO2 as an Intern
 
Cosmology in general
Cosmology in generalCosmology in general
Cosmology in general
 

KĂŒrzlich hochgeladen

Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Intelisync
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto GonzĂĄlez Trastoy
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 

KĂŒrzlich hochgeladen (20)

Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Call Girls In Mukherjee Nagar đŸ“± 9999965857 đŸ€© Delhi đŸ«Š HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar đŸ“±  9999965857  đŸ€© Delhi đŸ«Š HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar đŸ“±  9999965857  đŸ€© Delhi đŸ«Š HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar đŸ“± 9999965857 đŸ€© Delhi đŸ«Š HOT AND SEXY VVIP 🍎 SE...
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 

Authorization for workloads in a dynamically scaling heterogeneous system

  • 1. FABRIKAM AUTHORIZATION FOR WORKLOADS IN A DYNAMICALLY SCALING HETEROGENEOUS SYSTEM M.K.P.R. Jayawardhana 158217G Supervised by Prof. Gihan Dias Mr. Prabath Siriwardena Master of Science in Computer Science and Engineering University of Moratuwa Sri Lanka
  • 2. Dvaara Contribution of the Research Considering ‘Cloud’(eg: Amazon EC2, Azure, GCP) as the most common use case of a dynamically scaling, heterogeneous system, ● Design a solution for authorization among multi-cloud systems ● Implement the designed solution Re-use + implement lacking components + integration ● Implementation evaluation using a case study ● Performance evaluation 2
  • 3. Dvaara 3 Introduction Ref : https://www.slideshare.net/ajessup/building-trust-between-modern-distributed-systems-with-spiffe 3 Modern Enterprise Systems, ● Mostly Distributed Systems ● Horizontal Scaling ● Avoid vendor lock-in ● Make use of external systems than having everything in-house, ○ Make use of SaaS providers ○ Make use of PaaS providers ○ Make use of IaaS providers ● High availability concerns ● Elasticity of the system is a concern with rapid growth and peak and off-peak times. ● Follows Micro Services Architecture(MSA)
  • 4. Dvaara Why multi-cloud? ● Organizations are concerned on moving everything to the cloud → Security and Privacy concerns + Vendor lock-in ● Hybrid cloud to get started → Sensitive data residing on-premise and heavy computing delegated to an external cloud. ● Cost-effectiveness and reducing go-to-market time makes cloud appealing. Introduction 4 Ref: https://www.nutanix.com/enterprise-cloud-index/docs/enterprise-cloud-index.pdf, https://www.gartner.com/doc/3784664/building-identity-microservices “MSA(Microservice Architecture)-specific IAM(Identity and Access Management) is still in its infancy. The primary focus of the MSA community thus far has been authentication and, more narrowly, the use of OAuth 2.0, leaving other important questions, such as the authorization architecture, unaddressed”?? - Gartner
  • 5. Dvaara Problem Problem Statement ● Enterprise systems are becoming a service mesh. ● Each component of the system needs to scale as required, while being able to interact with other services. ● Interaction needs to be secured. ● Authentication between these services is being addressed. 5Ref : https://azure.microsoft.com/en-us/blog/microservices-on-azure-kubernetes-guidance/ How do we define and implement an authorization system for a multi-cloud enterprise system?
  • 6. Dvaara Use Case Problem Statement An e-commerce company has decided to start a cloud journey with below, considering the features supported by each CSP, cost and vendor lock-in. ● Keep the sensitive business operations in the on-premise cloud. ● Send data to be stored or archived to Amazon S3. Use EC2 analyse and summarize this data. ● Host a dashboard in GCP, that summarizes the details in Amazon S3 to identify the trends in the market. ● Need high elasticity (peak, off-peak seasons and times) To build the secure boundary, below interactions need to be secured - On-premise to Amazon - Amazon to GCP 6
  • 7. Dvaara Use Case - Problem Problem Statement Service authentication between multi-clouds when dynamic scaling is in place, is already a concern being addressed by research community. - Shared secret based - Kerberos protocol - CSP provided privileged API - SPIFFE standard How to support ‘Service Authorization’ in this system? 7 What should he be allowed to do?
  • 8. Dvaara Approach ● Study existing models, solutions and standards that support authorization between services. ● Study the other relevant aspects of authorization such as authentication and administration of access control policy as required by the authorization architecture for a cloud system. ● Build up the components of the architecture, that can coexist with the current enterprise systems, providing authorization capabilities across clouds. 8 Objectives
  • 9. Dvaara Literature Review Literature Review 1. Classical Security Models 1.1. Authentication 1.2. Authorization 2. Future of Cloud Systems 3. Workloads 3.1. Workload Authentication 3.2. Workload Authorization 9
  • 10. Dvaara Access Control Literature Review 10 Ref : R. S. Sandhu and P. Samarati, “Access control: principle and practice,” IEEE Commun. Mag., vol. 32, no. 9, pp. 40–48, 1994
  • 11. Dvaara Authentication Literature Review Identifying an entity such as a person, a group, a device or an application to be what they declare to be, - Something Known - Something Possessed - Something Inherent 11 Ref: D. Gollmann, “Computer security,” WIREs Comp Stat, vol. 2, no. 5, Sep. 2010
  • 12. Dvaara Authorization Literature Review ● DAC ● MAC ● Access Control Matrix ○ Access Control List ● RBAC ● ABAC ● XACML ● OPA 12 Image : https://image.slidesharecdn.com/350pmaxio-irmsummit2014gerry-140611105654-phpapp02/ 95/top-ten-reasons-why-developers-dont-adopt-abac-10-638.jpg Ref : R. S. Sandhu and P. Samarati, “Access control: principle and practice,” IEEE Commun. Mag., vol. 32, no. 9, pp. 40–48, 1994
  • 13. Dvaara Classical Security Models Literature Review ● Bell-La-Padula model - Confidentiality ● BIBA model - Integrity ● Chinese-Wall model - Conflict of Interest ● Clark-Wilson model - Integrity of commercial systems, Separation of duties ● Graham-Denning(GD) model - State transitions based on ACM ● Harrizon-Ruzzo-Ullman Model - Extending GD model ● Take-Grant Model - State transitions for confidentiality 13 Ref: D. Gollmann, “Computer security,” WIREs Comp Stat, vol. 2, no. 5, Sep. 2010
  • 14. Dvaara Cloud Literature Review - The most common, dynamically scaling, heterogeneous system - SaaS, PaaS, IaaS - Hyper-converged cloud to catalyze multi-cloud systems 14Ref: https://www.timetoast.com/timelines/cloud-computing-history
  • 15. Dvaara Workload Literature Review “A highly cohesive and de-coupled capability or a unit of work that collectively builds up an enterprise application, which can be running on cloud or on-premise” Eg: ● a microservice ● a Kubernetes pod ● a process in a VM 15 Ref: https://siliconangle.com/wp-content/blogs.dir/1/files/2016/02/illumio.png Ref : M. C. Calzarossa, M. L. Della Vedova, L. Massari, D. Petcu, M. I. M. Tabash, and D. Tessera, “Workloads in the Clouds,”, Springer International Publishing, 2016, pp. 525–550
  • 16. Dvaara Workload Authentication Literature Review ● Challenge-response authentication ○ Credentials stored with workload ○ Challenged to provide an inherent attribute based on the system ● Needham–Schroeder protocol ○ Use a symmetric key ○ Based on a third party ‘Authentication server’, building trust ● Kerberos Protocol ○ Based on KDC (Key Distribution Center) ○ Not relying on network security 16 Ref: B. C. Neuman and T. Ts’o, “Kerberos: an authentication service for computer networks,” IEEE Commun. Mag., vol. 32, no. 9, pp. 33–38, Sep. 1994.
  • 17. Dvaara Single Cloud Authentication Literature Review ● Platform provided privileged API based authentication ○ Amazon EC2 IID ○ Google Cloud Provider IIT ○ Microsoft Azure MSI 17 { "iss": "[TOKEN_ISSUER]", "iat": [ISSUED_TIME], "exp": [EXPIRED_TIME], "aud": "[AUDIENCE]", "sub": "[SUBJECT]", "azp": "[AUTHORIZED_PARTY]", "google": { "compute_engine": { "project_id": "[PROJECT_ID]", "project_number": [PROJECT_NUMBER], "zone": "[ZONE]", "instance_id": [INSTANCE_ID], "instance_name": "[INSTANCE_NAME]" "instance_creation_timestamp": [CREATION_TIMESTAMP] } } }
  • 18. Dvaara Multi-Cloud Authentication Literature Review SPIFFE (Secure Production Identity Framework For Everyone) ● A common protocol based on ‘Platform Provided Privileged API’ for authentication. ● Extendable to work with CSPs. ● A standard accepted by the CNCF(Cloud Native Computing Foundation). 18
  • 19. Dvaara Workload Authorization Literature Review ● RBAC ○ OAuth 2.0 with scopes - client_credentials grant ● ABAC ○ OAuth 2.0 with scopes - client_credentials grant ○ XACML ○ OPA ● Authorization Servers in the market ○ Based on OAuth2.0 MTLS standard ○ KeyCloak, Gluu, WSO2 IS, Ping Identity, IBM API Connect 19
  • 21. Dvaara Dvaara Design Options Solution Design Enforcing authentication and authorization 21 Local authentication and authorization Local authorization and Global authentication Local authentication and Global Authorization Global authentication and authorization
  • 22. Dvaara Dvaara Design Authentication Solution Design Comparison Authentication Mechanism 22 Mechanism Do not require to deploy credentials with the workload Single identity per workload API driven credentials rotation and distribution Cross-platform trust building Firewall Yes Yes No Yes Destination authentication No No No Yes Platform mediated identity Yes Yes Yes No SPIFFE Yes Yes Yes Yes
  • 23. Dvaara Dvaara Design Authorization Solution Design ● DAC vs MAC ○ Governing authorization of information flow is not in the current scope ○ Hence DAC ● RBAC vs ABAC ○ Need to considered fine grained attributes of workloads 23 RBAC ABAC Simplicity Yes Can be Complex Fine-grained No Yes Standardized No Yes (XACML/OPA) Comparison Authorization Mechanism
  • 24. Dvaara Dvaara Design - XACML or OPA Solution Design ● XACML vs OPA - policy comparison 24 XACML OPA Flexible ABAC support Yes Yes Extendability Yes Yes Complexity High Occasionally Verbose Yes No Required training Yes (Though it’s XML, have specific functions and behaviors to understand) Yes (Though it’s JSON like, have special meanings for symbols and ways of writing rules) Implementation Availability Axiomatics, Sun XACML engine, WSO2 Identity Server OPA Background Open standard by OASIS Open implementation, CNCF accepted.
  • 29. Dvaara Dvaara Implementation Contribution Solution Implementation Chain of Responsibility Pattern 29 TLS level validation on the SPIFFE X509 cert OPA based decision on allowed scopes, based on SPIFFE ID Token validation request ABAC, validating the workload attributes and context against OPA policy Using Java-SPIFFE lib New implementation of OPA based scope validation handler New implementation of OPA based token validation handler - Selected WSO2 IS authorization server was patched to support required parameters to be sent to OPA engine. WSO2 IS patched to enrich
  • 30. Dvaara Evaluation Solution Evaluation 30 1 2 1 - Token Request 2 - Actual API consumption using token
  • 32. Dvaara Evaluation Solution Evaluation 32 Correctness - Considered the use case of an employee management solution - Authorized access to a salary mgt API - Fine grained authorization based on Infrastructure layer details and application layer details - Verified results against the expected results
  • 33. Dvaara Conclusion 33 - What Dvaara can do? - Make authorization decisions based on infrastructure level and application level attributes - Understands the SPIFFE based authentication - Allow dynamic changes to authorization policy - Dvaara provides a viable solution for workload authorization in a multi-cloud system - Dvaara provides fine grained authorization in a dynamic manner - Dvaara bridges the existing authorization technology of OAuth 2.0 and TLS widely adopted open standard to the emerging cloud native standards of SPIFFE and OPA - Dvaara open doors for the existing enterprise systems to have benefits of hybrid or multi-cloud without compromising on service authorization policies.
  • 34. Dvaara Future Work 34 - Make access token a JWT(JSON Web Token) that can carry attributes(advices) between the workloads - Federation between SPIRE server or Authorization servers to expand trust boundary in a seamless manner - Performance improvements - add caching improvements at token validation - Provide an administration portal for the system - Single view on policy available to issue SPIFFE IDs - Single view of policies active in OPA engine - CRUD operations on the policies and evaluating the effect - Current overview of the system (active workloads, tokens etc.) - OAuth 2.0 specification to bind the token to the TLS layer. (currently happening in Dvaara in an indirect way)